The full text of this article
Method of trajectory privacy protection based on restraining trajectory in LBS
by Zemao Zhao; Jiabo Wang; Chuanlin Sun; Youwei Yuan; Bin Li
International Journal of Information and Communication Technology (IJICT), Vol. 13, No. 3, 2018
Abstract: With the development of mobile positioning technology, location-based services are becoming more and more widely used in life, but it has produced the security problem of the user's privacy leakage. In this paper, the problem of user trajectory privacy protection in location-based services is introduced, and a method of trajectory privacy protection based on restraining trajectory in LBS is proposed. The proposed method is done by restraining the release of sensitive position and choosing a non-sensitive position that the user might stay at with the maximum probability to replace the sensitive position. So it will prevent the leakage of sensitive position of user's trajectory, and protect the user's activity trajectory, and give the method of calculating the privacy protection degree of restraining method.
Online publication date: Tue, 10-Apr-2018
is only available to individual subscribers or to users at subscribing institutions.
Go to Inderscience Online Journals to access the Full Text of this article.
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Communication Technology (IJICT):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable).
See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org